Last year the Yankee Group warned us about ten consumer-driven threats that every network administrator should have on their radar screen. How many can you identify?
1. This type of Internet application allows end users to read and write personal email at work. What is it?
Answer
2. This term describes the practice of copying data from a desktop computer onto a personal storage device such as a USB drive, PDA or iPod. What is it?
Answer
3. This real-time communication technology can unwittingly become an "instant" security threat. What is it?
Answer
4. This feature, found on even the lowest-end cell phones, could be used for corporate spying. What is it?
Answer
5. Now that these portable organizational devices have large amounts of memory and wireless connectivity, there are many new ways for data to escape and for malware to sneak in. What are they?
Answer
6. This peer-to-peer VoIP service might be free and easy to use, but hackers have been caught trying to exploit its vulnerabilities. What is it?
Answer
7. Downloadable desktop _____ that display weather forecasts or stock quotes have become quite popular with end users. Unfortunately, they can also provide a backdoor to your network. What are they?
Answer
8. Enterprise applications delivered through the cloud using this software distribution model are vulnerable to Web-based attacks. What is the software model?
Answer
9. Employees attending a seminar in this popular virtual world might bring back more than just a bag of swag. Where were they?
Answer
10. Where might you find a worm on your wall? At Facebook. This type of networking site is an increasingly popular target for malware attackers. What is it?
Answer
Did you enjoy this quiz? Try some more of WhatIs.com's security-themed quizzes!
Tech TalkComment
Share
Comments
Results
Contribute to the conversation